Remote Logging: Sending Syslog to a remote host

This page includes:

About remote logging

The remote logging functionality lets you gather various logs from sources inside FortiMail Workspace Security, and send the logs to a SIEM solution, such as FortiSIEM, Splunk, or QRadar. This enables you to use your SIEM solution to perform tasks such as flagging and monitoring emails that have been found to be malicious and then quarantined. It also enables you to maintain a single source of all your FortiMail Workspace Security logs.

  • All messages are sent using the Syslog protocol - in CEF format.

  • There are 3 available communication protocols for sending FortiMail Workspace Security messages: TLS, UDP, and TCP.

  • Make sure to allowlist the sending IPs in your firewall. For details, see Allowlisting the sending IPs below.

Configuring remote logging

When you configure remote logging for an organization, make sure to perform the configuration on the child organization, not on the parent organization. Remote logging configurations that are set on a parent organization are not propagated to the child organizations.

When you configure remote logging, you'll need to specify:

  • Details about the destination server

  • The communication protocol

  • The message triggers

After configuring remote logging, make sure to allowlist the sending IPs in your firewall. For details, see Allowlisting the sending IPs below.

To configure remote logging:

  1. In FortiMail Workspace Security, in the left navigation menu, select Settings > Account.

  2. Scroll down to the Remote Logging section.

  3. Click Configure to edit the settings.

    The Remote Logging Configuration pane will open.

    Destination Details

    Destination name

    Specify a name that identifies the server to which the logs will be sent.

    Host and port

    The IP address of the server to which the logs will be sent, and the associated port on that server.

    Protocol

    Select the communication protocol that will be used to send the logs.

    Note:

    • UDP and TCP are not encrypted. Therefore, using TLS is recommended.

    • All messages are sent using the Syslog protocol - in CEF format.

    • TLS:

      • Server Certificate: Drop or specify the associated server certificate.

      • If required, enable client authentication.

        • Client Certificate: Drop or specify the associated client certificate.

        • Client Key: Drop or specify the associated client key.

    • UDP: No further configurations are required.

    • TCP: No further configurations are required.

    Message Triggers

    Category

    [Log types]

     

    Message triggers are the events that will trigger an event to be generated and then sent to the specified destination server.

    • When necessary, click Add Trigger to add and configure an additional trigger.

    Email scan

    After selecting Email scan, select one or more scan verdicts that will trigger an email-type event to be generated and then sent to the specified destination server.

    Note: You can configure only a single "Email scan" trigger.

    Note that the content of each scan event is not configurable.

    Audit Log

    After selecting Audit scans, select one or more actions that will trigger an audit-log-type message to be generated and then sent to the specified destination server. This enables you to monitor actions that are performed by admin users in FortiMail Workspace Security. The available actions are the Actions that appear in the Audit log. [See Audit log]

    Note: You can configure only a single "Audit scans" trigger.

Allowlisting the sending IPs

Make sure to configure your security policies to permit traffic from the IP addresses that are listed below.

Note: Select the correct set of IP addresses for the environment of your organization.

For US environments

For EU environments

For AUS environments

  • 3.81.182.154

  • 3.93.155.149

  • 3.95.118.12

  • 3.95.142.181

  • 54.227.64.76

  • 99.81.216.78

  • 34.249.190.60

  • 108.128.137.108

  • 99.80.189.20

  • 13.236.255.231

  • 54.66.125.250